Security Policy
Event Platform with Enterprise-Grade Security
At All In The Loop, safeguarding your event data is our top priority. Our platform is designed with enterprise-grade security, global compliance, and resilient infrastructure, ensuring your information is protected at every level.
Security Certifications & Standards
We recognise the importance of independent assurance for information security.
- Our vendors are ISO/IEC certified.
- We are in the advanced stages of preparing for ISO/IEC 27001 certification and will update clients as we progress.
- Fully compliant with GDPR, registered with the ICO, and aligned with global privacy regulations including CCPA and DPA.
Comprehensive Data Protection
We follow the principles of information security to ensure the integrity, availability, and confidentiality of your data:
- Integrity – Only authorised personnel can modify information, ensuring accuracy and reliability.
- Availability – Authorised individuals can access data in line with our or your Data Retention Policy.
- Confidentiality – Strict access controls ensure only approved users can view sensitive information.
To achieve these objectives, we employ:
- Access control policies
- Secure development environments
- Incident management protocols
- Annual third-party penetration testing
- Regular staff security training
- A robust internal audit programme
Infrastructure & Hosting
- Scalable & Secure – Proven to support events with over 20,000 concurrent attendees.
- Hosting with Amazon AWS – Our databases are securely hosted in private subnets with no public access. AWS data centres hold certifications including ISO 27001, PCI DSS Service Provider Level 1, SOC 1 & 2, and Cyber Essentials.
Advanced Security Features
- Multi-Factor Authentication (MFA) – Flexible MFA options for both back-end and attendee access.
- Single Sign-On (SSO) – Seamless access through company credentials, reducing login friction.
- Custom Privacy Controls – Configurable settings for events of any size or sensitivity.
Privacy Commitment
As your trusted data processor, we handle your data strictly as directed by you, the data controller. We never use, sell, or share client or user data for any purpose.
We comply with all relevant privacy frameworks, including GDPR, CCPA, and DPA, ensuring secure and ethical data handling.
Your data security is at the heart of everything we do.